EP1084475A1 - System amd method for implementing object workspace agents in a decision support environment - Google Patents

System amd method for implementing object workspace agents in a decision support environment

Info

Publication number
EP1084475A1
EP1084475A1 EP99927184A EP99927184A EP1084475A1 EP 1084475 A1 EP1084475 A1 EP 1084475A1 EP 99927184 A EP99927184 A EP 99927184A EP 99927184 A EP99927184 A EP 99927184A EP 1084475 A1 EP1084475 A1 EP 1084475A1
Authority
EP
European Patent Office
Prior art keywords
workspace
agent
network
enterprise
collaboration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99927184A
Other languages
German (de)
English (en)
French (fr)
Inventor
Ranjit N. Notani
Abhay V. Parasnis
Mark B. Whipple
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
I2 Technologies Inc
Original Assignee
I2 Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/092,348 external-priority patent/US6119149A/en
Application filed by I2 Technologies Inc filed Critical I2 Technologies Inc
Publication of EP1084475A1 publication Critical patent/EP1084475A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Definitions

  • This invention relates in general to the field of supply chain, enterprise and site planning and, more particularly, to a system and method for implementing object workspace agents in a decision support environment.
  • Supply chain, enterprise and site planning applications and environments are widely used by manufacturing entities for decision support and to help manage operations.
  • Decision support environments for supply chain, enterprise, and site planning have evolved from single-domain, monolithic environments to multi- domain, monolithic environments.
  • Conventional planning software applications are available in a wide range of products offered by various companies. These decision support tools allow entities to more efficiently manage complex manufacturing operations.
  • supply chains are generally characterized by multiple, distributed and heterogenous planning environments. Thus, there are limits to the effectiveness of conventional environments when applied to the problem of supply chain planning due to monolithic application architectures. Further, these problems are exacerbated when there is no one "owner" of the entire supply chain.
  • the decision being made may be how much of a given item a factory should produce during a given time period.
  • the "optimal" answer depends on the domain of the decision.
  • the domain may be, for example, just the factory itself, the supply chain that contains the factory, the entire enterprise, or the multi-enterprise supply chain. (The latter two can be considered to be larger domains or multiple domains.)
  • the larger the domain of the decision support the more optimal the decision will be. Consequently, it is desirable for decision support software to cover ever larger domains in the decision making process. Yet, this broadening of coverage can create significant problems.
  • One such problem involves the limitations of present decision support software that do not allow remote entities in the domain or multi-domain environment to access a local object workspace. Such software does not allow such remote entities to easily execute administrative tasks, optimization routines or other forms of data and object manipulation in a local workspace.
  • a system and method for implementing object workspace agents in a decision support environment are disclosed that provide advantages over conventional supply chain, enterprise and site planning environments.
  • a computer system for remotely accessing data in a multi- enterprise collaboration comprises a workspace associated with a first enterprise having a plurality of stored objects.
  • the computer system further comprises a network node associated with a second enterprise, the network node being in communication with the workspace across the network.
  • the computer system further comprises an agent generated at the network node, the agent operable to access the workspace via the network, the agent further operable to manipulate at least one of the plurality of stored objects within the workspace to perform a collaboration activity.
  • a technical advantage of the present invention is the ability to access a remote workspace with an agent to satisfy programmed goals of the agent in that remote workspace.
  • a further technical advantage of the present invention is the ability of the agent to execute tasks in a first enterprise, node or platform despite being initiated at a second enterprise, node or platform with which the agent has lost contact.
  • a further advantage of the invention is that the agent is able to communicate results of executed tasks performed at a destination node back to an originating node.
  • Another advantage is that the agent is operable to execute or operate on other agents which are residing in a workspace. Additional technical advantages should be readily apparent to one skilled in the art from the following figures, descriptions, and claims.
  • FIGURE 1 is a diagram of one embodiment of a computer implemented architecture that can support enterprise collaboration
  • FIGURE 2 is a diagram of one embodiment of components of a global collaboration framework
  • FIGURE 3 is a diagram of the global collaboration framework of FIGURE 2 where certain software elements that make up particular modules are highlighted
  • FIGURE 4 is a block diagram of one embodiment of a system allowing collaboration within and between enterprises for optimal decision making;
  • FIGURE 5 is a block diagram of one embodiment of the use of a global collaboration workspace
  • FIGURE 6 is a diagram of one embodiment of a lifecycle for a collaboration
  • FIGURE 7 is a diagram of situations where common software is present on both sides of a relationship and where it is not;
  • FIGURE 8 is a block diagram of one embodiment of a security configuration for a hub-to-spoke and hub-to-web case
  • FIGURE 9 is a block diagram of one embodiment of a security configuration for a hub-to-hub case
  • FIGURE 10 is a diagram of one embodiment of designing an inter-enterprise workflow that includes parameterization over groups
  • FIGURE 11 is a diagram of one embodiment of managing change be modifying a design of a workflow
  • FIGURE 12 is a diagram of one embodiment of integration of a workflow with the outside world
  • FIGURE 13 is a diagram of one embodiment of a data flow running in a single activity
  • FIGURE 14 is a diagram of one embodiment of a data flow split across multiple activities
  • FIGURE 15 is a block diagram of one embodiment of an common data model based transformation model
  • FIGURE 16 is a diagram of one embodiment of a direct transformation
  • FIGURE 17 is a diagram of one embodiment of different access and transformation levels
  • FIGURE 18 is a diagram of one embodiment of substituting a hub engine for a spoke engine within a collaboration
  • FIGURE 19 is a block diagram on one embodiment of a computer system using a workspace configured according to the teachings of the present invention.
  • FIGURE 20 is a diagram of one embodiment of the workspace of FIGURE 19 configured according to the teachings of the present invention
  • FIGURE 21 is a block diagram of a computer system using an agent to access an object workspace according to the teachings of the present invention.
  • FIGURE 22 is a flowchart illustrating one embodiment of a method of using the agent of FIGURE 21 to access a workspace.
  • Improvement of decision support processes involves expansion to provide enterprise level and multi-enterprise level decision support for optimal decision making.
  • FIGURE 1 is a diagram of one embodiment of a computer implemented architecture that can support enterprise collaboration.
  • a global decision support architecture can be built upon underlying link, vision, global messaging and data warehouse components.
  • Collaboration can then involve a global collaboration designer (GCD) and a global collaboration manager (GCM) supported by the decision support architecture.
  • GCD global collaboration designer
  • GCM global collaboration manager
  • the global collaboration designer can be used to design and instantiate collaborations, and the global collaboration manager can be used to run the collaborations.
  • collaborations can be referred to as modules and can be versioned.
  • FIGURE 2 is a diagram of one embodiment of components of a global collaboration framework.
  • the framework can allow an hub enterprise 2 to collaborate with a spoke enterprise 4 and a web enterprise 6.
  • Hub enterprise 2 and spoke enterprise 4 each include a global collaboration manager 8.
  • Global collaboration managers 8 are coupled to and communicate with respective internal global collaboration workspaces 10.
  • An external global collaboration workspace 12 provides a means for sharing data between hub enterprise 2, spoke enterprise 4 and web enterprise 6.
  • Hub enterprise 2 can also collaborate through an electronic data interchange (EDI) processor 14 with a value added network (VAN) .
  • EDI electronic data interchange
  • VAN value added network
  • hub enterprise 2 can communicate and collaborate with other hub enterprises using a global message bus 15.
  • the primary controller of the collaboration can be the GCM engine 8 of hub enterprise 2.
  • a hub enterprise 2 can generally have an internal GCW 10 and an external GCW 12.
  • Internal GCW 10 can be used to share and exchange data with internal user interfaces as well as EDI processor 14.
  • External GCW 12 can be used to share and exchange data with spoke enterprises 4 and web enterprises.
  • external GCW 12 can be installed in a
  • FIGURE 3 is a diagram of the global collaboration framework of FIGURE 2 where certain software elements that make up particular modules are highlighted. As can be seen, software for the global collaboration manager module can be present in the following places: in the hub engine 8, in the spoke engine 8, in the hub-user user interface (UI), in the spoke-user UI and in the web-node UI .
  • the module can communicate with native applications 17 on the hub enterprise 2 and spoke enterprise 4. Communications with native applications 17 can be either synchronous (dot line) or asynchronous (solid line) . Asynchronous communication with native applications 17 can be facilitated by the internal GCW's 10, as shown. Further, a global series database (GSDB) can be present on the hub enterprise 2 side.
  • GSDB global series database
  • FIGURE 4 is a block diagram of one embodiment of a system, indicated generally at 16, allowing collaboration within and between enterprises for optimal decision making.
  • system 16 includes a hub node 18 which can be a process within a hub engine executing on a computer system.
  • Hub node 18 is coupled to and communicates with a spoke node 20 which also can be a process within a hub engine executing on a computer system.
  • spoke node 20 can be outside an enterprise boundary 22 of hub node 18.
  • Hub node 18 is also coupled to and communicates with a plurality of spoke nodes 24 which can be processes within a spoke engine executing on one or more computer systems.
  • Hub node 18 can further be coupled to and communicate with a plurality of web nodes 26 which can be processes within a web browser executing on a computer system.
  • hub node 18 is coupled to and communicates with an EDI (Electronic Data Interchange) proxy 28 which can provide a gateway to EDI systems.
  • EDI Electronic Data Interchange
  • Hub engines and spoke engines can be the primary entities of a global collaboration manager.
  • a hub engine is the primary controller of the collaboration.
  • the hub engine can coordinate both global collaborations as well as local collaborations.
  • Global collaborations are those that span hub nodes 18, spoke nodes 20 and 24 and web nodes 26.
  • Local collaborations can run on any single role hub or spoke/spoke-group. These collaborations can be distributed, but stay within the confines of a single enterprise.
  • Hub engines can also coordinate with hub-user interfaces (UI) as well as the VAN-EDI processor of an EDI proxy 28.
  • hub engines are multi-threaded engines that can simultaneously coordinate multiple collaborations as well as multiple versions of the same collaboration.
  • the hub engines can dynamically load and execute collaborations.
  • a spoke engine can also operate to initiate a collaboration.
  • a spoke engine is not an independent entity. Instead a spoke engine can only coordinate a collaboration in con unction with a hub engine.
  • a spoke engine can not coordinate with other spoke engines or other web-nodes.
  • a spoke engine can be multi-threaded and can simultaneously coordinate multiple collaborations as well as multiple versions of the same collaboration. Spoke engines can also dynamically load and execute collaborations.
  • FIGURE 5 is a block diagram of one embodiment of the use of a global collaboration workspace 30.
  • global collaboration workspace 30 provides the primary entity used to share data/objects between the various entities in the collaboration.
  • workspace 30 can interface with global collaboration managers (GCMs) 32, a local system 34, a web server 36 and web interface 37 and native applications 38.
  • GCMs global collaboration managers
  • objects can be placed into global collaboration workspace 30 by one entity and retrieved by another entity. Retrieval can be achieved either by querying or by subscription.
  • global collaboration workspace 30 combines the attributes of a database as well as a message bus.
  • the global collaboration workspace can be organized as a hierarchy of slots which can be in-memory or persistent. Slots also can be queued or regular, and fine grained permissibilities can be attached to each slot. The permissibilities can be assigned by-user-by-operation. The primary operations can be read, write, take, and subscribe.
  • In-memory slots hold their data in volatile memory.
  • the global collaboration workspace 30 can be considered a fast, secure, in-memory object database, with security and messaging capabilities. Persistent slots hold their data in stable storage. Writing and retrieval from persistent slots is slower than for in-memory slots, but data is not lost if the global collaboration workspace 30 goes down.
  • Global collaboration workspace 30 stores data in the form of objects and can store Java Objects, CORBA objects or arbitrary byte arrays. This, coupled with its in-memory capabilities, makes global collaboration workspace 30 appropriate as a high-speed data sharing mechanism between other object-oriented in-memory engines such as 12 TECHNOLOGIES' SUPPLY CHAIN PLANNER and FACTORY PLANNER.
  • a global collaboration designer provides a tool to allow collaboration designers to interactively design, instantiate and deploy collaborations to be run using the global collaboration manager. The output of the global collaboration designer is code that can be automatically loaded and run by the global collaboration manager.
  • the global collaboration designer can allow designers to create new collaborations, retrieve existing collaborations, and version collaborations.
  • the global collaboration designer can also allow designers to design the hub and spoke network for collaborations and design the events and messages of the collaboration.
  • the global collaboration designer can integrate a standard object library and a standard component library for easy usage from within the global collaboration designer.
  • the global collaboration designer can be used to create sophisticated multi-enterprise workflows with synchronous, asynchronous, sub-workflow, and-splits, or-splits, synchronization-joins, heterocast-splits, heterocast-joins etc.
  • Global workflows and local workflows can both be created.
  • the global collaboration designer can provide automatic verification of collaborations and automatic code generation, which code is run by the global collaboration manager.
  • FIGURE 6 is a diagram of one embodiment of a lifecycle for a collaboration.
  • a collaboration can be designed using the global collaboration designer.
  • a collaboration can be instantiated using the global collaboration designer.
  • the instantiated collaboration can then be deployed, in step 44, using the global collaboration designer and the global collaboration manager.
  • the collaboration can be run using the global collaboration manager in step 46.
  • a new instance can be created or a new version of the collaboration can ve created.
  • the flow returns to step 42.
  • the global collaboration designer can be used in step 48 to modify the collaboration.
  • the extension from single-domain decision support to multi-domain decision support can be complicated.
  • the following discussion describes a number of challenges presented by multi-domain decision support and embodiments of how those challenges are addressed by the present system and process allowing collaboration within and between enterprises for optimal decision making.
  • Format standards refer to the technological formats in which the data/objects are encoded. Examples include XML, Java Serial Streams, HOP Serial Streams and EDI format. Transport standards are used to pass data around. These can include HTTP, HOP, RMI, DCOM, FTP, Value Added Networks, Asynchronous Message Buses such as MQSeries, etc.
  • semantic standards are the way in which the semantic content of the data is described. Examples include EDI, 12 COMMON DATA MODEL (CDM) .
  • EDI is primarily a semantic standard, but also typically implies a format standard (the EDI file format) and a transport (a Value Added Network) .
  • EDI semantic standard can be separated from the other two.
  • semantic EDI objects can be encoded in other formats such as Java Serial Streams and can be passed over other transport standards such as HTTP.
  • XML is primarily a format standard that can be used to encode various semantic standards.
  • XML XML
  • EDI EDI
  • Java Serial Streams referred to as Java format and not to be confused with the Java Language or Java Platform
  • HOP Serial Streams HOP Serial Streams.
  • the Java format is the primary format, and the rest are derived formats. Because the Java Format can contain the behavior to produce the other formats, it has been chosen as the primary format.
  • XML, EDI and HOP formats can be derived from the Java Format.
  • FIGURE 7 is a diagram of situations where common software from 12 TECHNOLOGIES' is present on both sides of a relationship and where it is not.
  • RHYTHM GLOBAL COLLABORATION MANAGER is on both sides, nothing is to be gained by converting to an intermediate format. This would introduce needless inefficiency, and only data (not objects) would be exchangeable, limiting the range of applications. Hence when the same software is present on both sides, binary Java objects can be directly exchanged.
  • RHYTHM GLOBAL COLLABORATION MANAGER is present only on one side, XML or EDI-formatted "objects" can be produced (outbound) and interpreted (inbound) .
  • the present global collaboration manager can support a variety of transport standards, including HTTP, HOP, and Asynchronous Message Buses. More details are provided below with respect to Handling Multiple Relationship Types.
  • the present global collaboration manager can primarily support two semantic standards, EDI and RHYTHM-CDM.
  • EDI can be supported because it is generally the most popular semantic standard. However it suffers from the drawback (amongst others) of not providing deep coverage of the planning domain.
  • the RHYTHM-CDM provides deep coverage of the planning domain and will provide appropriate constructs for performing multi-enterprise decision support. Additionally, this format is supported by all of 12 TECHNOLOGIES' planning engines.
  • RHYTHM-GCD a community of enterprises can devise a set of standards that are relevant to that community only.
  • RHYTHM-GCM will support and enforce these proprietary community standards.
  • RHYTHM-GCD also supports a library of building block objects that can be composed into proprietary community standards.
  • Proprietary community standards have a number of advantages, including: they can be designed to exactly cover the kinds of data/objects that enterprises would like to exchange; only the relevant parties need to agree upon the particular standard, hence the process will be much quicker than waiting for a standards body; different standards can be developed for different categories of partners and, in the extreme case, a different standard for each partner; and standards that give the supply chain a competitive advantage over competitors can be developed.
  • Enterprises have relationships of various types with their partners. Some ways relationships can vary are: between major trading partners on the one hand and between minor trading partners on the other; between enterprises of roughly equal influence over the supply chain and between enterprises of unequal influence over the supply chain; and between enterprises with a high degree of technological sophistication on the one hand and between enterprises with an unequal degree of technological sophistication on the other. As should be understood, these different relationship types should be handled differently.
  • the present global collaboration manager can model enterprise relationships as a hub and spoke network, as described above and shown in FIGURE 4. In this embodiment, the four types of relationships are: Hub-to-Web; Hub-to-Van-EDI; Hub-to-Spoke and Hub-to-Hub. Each relationship-type has its appropriate usage.
  • hub-to-spoke With respect to hub-to-spoke, this relationship type also enables system-to-system integration like VAN-EDI.
  • Architecturally hub-to-spoke is a collaboration between a hub engine and a spoke engine.
  • the hub-to-spoke relationship can have advantages vis-a-vis VAN-EDI: it can use the public Internet to reduce network costs; administrative costs are much lower than VAN-EDI because a large portion of the hub-to-spoke relationship infrastructure can be centrally deployed and administered; true objects (m addition to ust data) can be exchanged allowing for much more advanced collaborations; and multiple semantic standards can be supported including EDI, I2-CDM and Proprietary Community Standards.
  • the hub-to-spoke relationship can be appropriate between enterprises that wish to perform sophisticated system-to-system collaboration. It can also be appropriate where no 12 TECHNOLOGIES' software is present in either of the enterprises. This is because the hub-to-spoke relationship can be centrally deployed by the hub enterprise.
  • hub-to-hub With respect to hub-to-hub, the relationship is similar to hub-to-spoke except that it takes place between two hub engines rather than a hub and a spoke engine. Based on this characteristic, the hub-to-hub relationship can be appropriate between enterprises that wish to perform sophisticated system-to-system collaboration. Further, the hub-to-hub relationship can be appropriate when two enterprises have individually and separately purchased RHYTHM-GCM and have set up hub engines.
  • hub engines There are differences between hub engines and spoke engines.
  • a hub engine's capabilities are a superset of a spoke engine's capabilities.
  • the following table provides an example of some of the differences.
  • Any multi-enterprise collaborative framework should address all of these different facets.
  • the requirements for a collaborative security framework can include that: data exchanged between two partners should only be seen by the two partners; data exchanged between two partners should be tamper-proof; an enterprise should be able to verify that a partner is who it claims to be; the framework should not introduce new security holes into a partners' network; and the framework should be relatively easy to set up and administer.
  • a secure collaborative framework can be provided by implementing a comprehensive security strategy to address the above requirements.
  • the strategy has three different aspects to it: technological security, a permissibility framework and data partitioning.
  • Technological security can refer to the technological means used to guarantee security. This security can be used to provide: privacy, authentication and data integrity. Privacy ensures that no unauthorized person can see the data. Authentication involves authenticating that the parties in the collaboration are really who they claim to be. Data Integrity involves making it impossible for an unauthorized person to modify data being sent in any fashion.
  • SSL 3.0 is an industry standard protocol used to support public key encryption over a socket-based connection and provides: privacy, client as well as server authentication, data integrity and certificate management.
  • SSL 3.0 is a higher level protocol into which several public-key cryptography algorithms can be plugged including RSA and Diffie-Helman.
  • username-password authentication This provides authentication beyond what SSL 3.0 itself provides.
  • Passwords can be stored using PKCS5 password-based encryption (an RSA standard) .
  • PKCS5 password-based encryption an RSA standard
  • This access token has an administrator-specifiable lifetime. A user can then access the system for the duration of validity of the access token. This has the beneficial effect of not requiring authentication on each access.
  • Each application which is accessed authenticates the access token by validating the signature (which is a digest encrypted using the Security Manager's private key) of the Security Manager.
  • the technological security framework is a portion of the security scheme. The other portion has to do with the design of the collaborations themselves.
  • the framework should allow enterprises to easily attach permissibilities to various actions that other enterprises can perform on it.
  • the global collaboration workspace can support a hierarchical permissibility model with individual permissibilities attached to different data elements in the hierarchy. In particular, it can support user-specific and spoke-specific read, write, take and subscribe permissibilities. Hence, enterprises can finely tune who can read what data, who can write what data, who can take what data and who can subscribe to write-notifications on what data.
  • a third element in the collaboration framework security strategy is the ability to partition data across various collaborative workspaces.
  • the collaborative workspaces are split into an internal collaborative workspace and an external collaborative workspace. Only data that needs to be truly shared with partners is in the external collaborative workspace. The rest is in the internal collaborative workspace.
  • the external collaborative workspace is designed to sit either outside the corporate firewall or in an Extranet or DMZ .
  • the collaboration framework design does not require the external collaborative workspace to make connections through the corporate firewall into the Intranet (although it could) .
  • global collaborations can use both the external and internal collaborative workspaces. Local collaborations can use only the internal collaborative workspace and are hence completely invisible to partner enterprises. Even for global collaborations only the relevant portions use the external collaborative workspace.
  • each partner enterprise can only see (read, write, take, subscribe) to its own data.
  • FIGURE 8 is a block diagram of one embodiment of a security configuration for a hub-to-spoke and hub-to-web case.
  • a hub enterprise 50 is coupled to and communicates with an internal global collaboration workspace 52 and an external global collaboration workspace 54.
  • a spoke enterprise 56 and a web enterprise 58 connect through a web server 60 to the external global collaboration workspace 54.
  • Spoke enterprise 56 like hub enterprise 50, has an internal global collaboration workspace 62.
  • the enterprises 50, 56 and 58 can be protected by associated firewalls, while the extranet formed by web server 60 and external global collaboration workspace 54 can be protected by a filtering router and communication via HTTP over SSL 3.0.
  • FIGURE 9 is a block diagram of one embodiment of a security configuration for a hub-to-hub case.
  • a hub enterprise 64 and a hub enterprise 66 can communicate across an SSL 3.0 protected TCP/IP connection. The communication can be between separate global message brokers 68 and 69. Both hub enterprises 64 and 66 are protected by a firewall, as shown.
  • One of the problems with multi-enterprise decision support can be that there is no closed loop collaboration. Instead, data may be lobbed from one enterprise to the next with no coherent workflow. In order to implement closed loop collaboration, support for creating multi-enterprise workflows is necessary. The present global collaboration manager and designer can make it possible to construct, deploy, monitor and change sophisticated multi-enterprise workflows .
  • a "workflow” can be a set of “activities” joined together by data flows that together accomplish some task. Workflows are typically executed on workflow engines.
  • a “distributed workflow” can refer to a workflow that is executed on multiple workflow engines. In other words, different portions of the workflow execute on different engines.
  • a “node” can refer the abstract entities on which different workflow engines of a distributed workflow run, and a “node group” can be a set of nodes grouped by some characteristic.
  • a “multi- enterprise distributed workflow” can be distributed workflows where the nodes are enterprises. Parameterization of workflows can be important for enterprise collaboration.
  • a “parametric workflow” is a workflow that is parameterized over some variable and can be regular or distributed.
  • a "distributed workflow parameterized over nodes in a node group” can refer to distributed workflows where the parameters of the workflow are the nodes in a node group. Hence, when the workflow is instantiated it is tailored to a particular node in a node group.
  • workflows parameterized over groups Another important feature is support for workflows parameterized over groups.
  • Some multi-enterprise workflows involve a large number of enterprises. In such cases it can become impractical to create individualized workflows for each partner. Instead it can be advantageous to create workflows that are parameterized over groups of partners.
  • two groups may be primary suppliers and secondary suppliers.
  • the primary suppliers group could have one type of workflow
  • the secondary suppliers group could have another type of workflow.
  • Group-based workflows can be parametric in the sense that, at run time, an actual workflow can be created specific to a member of a group.
  • an enterprise may collaborate, for example, with potentially hundreds or thousands of other enterprises.
  • Each collaboration or multi-enterprise workflow can be potentially (and typically) unique.
  • HETEROCASTING workflow definition technique generally involves using a parameterized workflow definition to instantiate heterogeneous workflows based upon differences in the parameters.
  • HETEROCASTING definition technique allows a non-parametric distributed workflow to be easily
  • HETEROCAST split activity HETEROCAST join activity. All activities between a HETEROCAST split and a HETEROCAST join are parameterized over the nodes of a node group that these activities correspond to.
  • FIGURE 10 is a diagram of one embodiment of designing an inter-enterprise workflow that includes parameterization over groups.
  • the workflow can begin with a listening activity 70 that waits for some event.
  • Activity 70 can be linked to parallel activities 71 that links to a sub-workflow 72 and to a heterocast split 73.
  • Sub- workflow itself, can include a workflow definition.
  • HETEROCASTING the workflow after heterocast split 73 then becomes parameterized.
  • activity 74 is a parameterized activity.
  • a heterocast join 75 receives flow from activity 74.
  • Sub-workflow 72 and heterocast join 75 are linked to a synchronous or asynchronous join 76 which, in turn, links to an integrated event 77 (e.g., multicasting).
  • a workflow like that of FIGURE 10 can be designed using the present global collaboration designer and can allow full representation of workflow for inter-enterprise decision support. This workflow can then be instantiated and implemented through the present global collaboration manager.
  • FIGURE 11 is a diagram of one embodiment of managing change be modifying a design of a workflow.
  • an initial workflow design can have an event 70 linked to a parallel activity split 71. Between activity split 71 and a join 76, there can be, for example, two activities 78. This work flow, once designed, can be instantiated and implemented using the global collaboration manager. If a change needs to be made to the workflow, the global collaboration designer greatly alleviates the trouble of making the change. For example, a new activity 79 can be added between split 71 and join 76. The workflow can then be centrally reinstantiated and implemented.
  • the HETEROCAST technique can allow the construction of distributed workflows parameterized over nodes in a node group. This can allow a huge productivity gain over designing individual workflows for individual group members. Further, this technique makes rapid design and prototyping of sophisticated inter-enterprise workflows with hundreds or thousands of partners feasible.
  • the technique should be distinguished from conventional "multicasting" in which identical messages are sent out to the various nodes (partners). In essence, multicasting allows you to design a single workflow that runs identically across multiple nodes. This differs from the HETEROCASTING technique, where the workflows run differently based on which node they are running across.
  • Role-based workflows allow workflows to be specified using generic roles. This capability allows the creation of generic or templated workflows that can be instantiated in various scenarios.
  • the role types can be: partner roles, spoke roles; spoke group roles; web roles; web group roles; user roles.
  • partner roles refer to the different roles played by partners.
  • one partner role in the case of procurement is primary supplier and secondary supplier.
  • Role-based workflows can lead to the concept of three different phases in the design and execution of a workflow.
  • the design phase is the phase in which role-based workflows are defined.
  • the instantiation phase is the phase in which roles are mapped to instances. For example, primary supplier may be mapped to a first company, and PO_approver may be mapped to John Doe.
  • the run time phase can be the phase in which the instantiated workflow runs.
  • a further important feature is the integration of automated workflows with user-oriented workflows. Workflows can often be described as having two varieties: automated system-to-system workflows, and user interface workflows. While there are workflows that are completely automated, and there are workflows that are completely user driven, most workflows have automated as well as user interface elements. The present global collaboration manager and designer do not need to make this artificial distinction between workflow types. Hence, the workflows can be automated m parts and interact with users in other parts. Both the automated parts and user parts can span multiple enterprises.
  • FIGURE 12 is a diagram of one embodiment of integration of a workflow with the outside world.
  • sophisticated mter- and mtra-enterprise workflows can be created. These workflows can be composed of activities strung together in various configurations. There is no restriction on what the different activities of the workflow can do, yet one of the major tasks of these activities is to integrate with the outside world.
  • FIGURE 12 shows how a workflow can be integrated with the outside world using a component-based approach to integration.
  • the components can include accessors 80, transformations 82, transfer objects 84, adaptors and flows 86.
  • the global collaboration manager can support a component-based integration model.
  • the component-based integration model allows flexibility m structuring the integration.
  • Primitive components can include accessors 80, transformers 82 and transfer objects 84.
  • Compound components include adaptors and flows 86.
  • Compound components are built in terms of primitive components.
  • accessors 80 are used to access an external source such as SCP (SUPPLY CHAIN PLANNER) , SAP, a relational database, web servers, email, message buses etc. Accessors 80 can be used to read, write or listen to sources and destinations of data.
  • Transformers 82 can be used to transform data from one form to another form.
  • Transfer Objects 84 are objects that can be passed from activity to activity or from enterprise to enterprise. Transfer objects 84 can be optionally convertible to EDI, XML, CORBA structures etc. Accessors 80 and Transformers 82 can be strung together to form flows. An entire flow can be executed in a single activity as shown in FIGURE 13.
  • FIGURE 13 is a diagram of one embodiment of a data flow running in a single activity 92.
  • a data source 90 can be accessible from and provide data to an accessor component 94.
  • Accessor component 94 then can pass data through transformer components 96 and 98 which provide data to a second accessor component 100.
  • Data can then be stored in a data destination 102.
  • FIGURE 14 is a diagram of one embodiment of a data flow split across multiple activities 104 and 106. As shown, the flow of FIGURE 14 differs from that of FIGURE 13 in that transformer components 96 and 98 are within separate activities 104 and 106 and communicate by a transfer object. Multi-enterprise data flows can be based on the model of FIGURE 14 rather than that of FIGURE 13.
  • 12- CDM based transformations are based on 12 TECHNOLOGIES' COMMON DATA MODEL (CDM) .
  • CDM is an abstract schema that is available in both relational and object forms.
  • FIGURE 15 is a block diagram of one embodiment of an I2-CDM based transformation model.
  • transformers and accessors can be coupled to transform a application data into a CDM data object 110 and vice versa.
  • a SUPPLY CHAIN PLANNER (SCP) object 112 can be created by an SCP accessor from SCP data 114.
  • SCP object 112 can then be transformed by an SCP-CDM transformer into a CDM object 110.
  • an SAP object 116 can be created by an SAP accessor from SAP data 118.
  • SAP object 116 can then be transformed by an SAP-CDM transformer into a CDM object 110.
  • SAP accessor and transformer can be combined into a standard SAP-CDM adapter 120 that can be used for CDM-based transformations other components.
  • a BAAN object 122 can be created by a BAAN accessor from BAAN data 124.
  • BAAN object 122 can then be transformed into a CDM object 110 by a BAAN-CDM transformer. These transforms work in the other direction as well.
  • FIGURE 16 is a diagram of one embodiment of a direct transformation.
  • objects are converted from one form to another without passing through an intermediate format.
  • SUPPLY CHAIN PLANNER (SCP) data 130 can be accessed by an SCP accessor to create an SCP object 132.
  • SCP object 132 can then be directly transformed to a FACTORY PLANNER (FP) object 134.
  • FP object 134 can then become FP data 136 through an FP accessor. This data flow can operate in the other direction as well.
  • FIGURE 17 is a diagram of one embodiment of different access and transformation levels.
  • access and transformation can have three levels.
  • a first level 140 can involve table access and transforms.
  • a second level 142 can involve generic object (tree, graph, etc.) access and transforms, and a third level can involve specific object (build-of-materials, plan, etc.) access and transforms.
  • hub-to-web has all the deployability characteristics of traditional web applications.
  • Hub-to-VAN EDI can be deployable to the extent that it leverages an existing VAN-EDI infrastructure. While the hub-to-web relationship is highly deployable, it can suffer from the problem of requiring a human on the web side of the relationship. In other words, it may not be suited to system-to-system collaboration.
  • the hub-to-spoke solution can provide maximal deployability m the system-to-system collaboration environment.
  • the spoke engine is analogous to the web browser, and the spoke portion of the collaboration is analogous to a web page or applet.
  • the spoke portion of the collaboration can be centrally designed and deployed to the remote spoke engines. Unlike a web-page or applet, there may still be integration that needs to be done remotely. This remote integration may be unavoidable but can be circumscribed and precisely defined by the spoke portion of the collaboration.
  • Another aspect of deployability is handling versioning. Collaborations once designed and deployed are likely to need changing (in various different ways) as time progresses. It can be important that subsequent versions of collaborations be as easily deployable as initial versions.
  • the present global collaboration manager can provide complete support for versioning and centralized redeployment of collaborations. Further, different versions of collaborations can be run simultaneously without impacting each other. This allows an existing version to be gracefully phased out while another version is phased in.
  • Another element of the deployability of the present global collaboration manager is the leverage of existing infrastructure. This element is evident, for example, in the support of the hub-to-spoke relationship over existing web protocols. Supporting hub-to-spoke over existing web protocols can be important to rapid deployment since it does not require modification or reconfiguration of an existing web infrastructure. A large time savings in this regard can come from not having to modify carefully designed firewall and security infrastructures that may already be in place.
  • FIGURE 18 is a diagram of one embodiment of substituting a hub engine for a spoke engine within a collaboration.
  • an enterprise may deploy a hub engine 150 on itself and a spoke engine 152 at all of its partner sites.
  • a spoke engine 154 may be at a partner site (E2) .
  • the partner site (E2) wishes to design and control its own collaborations, it can replace spoke engine 154 with a hub engine 156. From El's perspective, E2 can still be a spoke in El's collaboration. However, this spoke now runs on a hub engine 156 which can control its own collaborations with spoke engines 158. Further, spoke engines 160 and 162 might be associated with a third entity (E3) that interacts with both hub engine 150 and hub engine 156 on behalf of E3.
  • E3 third entity
  • An important aspect of the present framework is extensibility. Without extensibility, the framework may not be able to handle new situations and challenges with which it is confronted. There can be several different dimensions to this extensibility. For example, one primary area of extensibility is in the area of semantic object standards. If supported standards do not suffice for a particular problem, then the framework can be augmented with new semantic standards. Additionally the framework allows the building of proprietary semantic standards. Further, the framework can be extended by adding new accessors, transformers, adapters, etc.
  • the standard component library can be extended both generally and by end-users.
  • FIGURE 19 is a block diagram of one embodiment of a computer workspace 200 in a computer system 205.
  • Computer workspace 200 includes a plurality of memory slots 210 in communication with a permissibility framework manager 220 and an event manager 230.
  • Permissibility framework manager and event manager 230 may or may not be resident within computer work space 200.
  • Computer workspace 200 is accessed by network nodes 240 via network 250.
  • permissibility framework manager 220 controls access to memory slots 210 within computer workspace 200 by network nodes 240.
  • Event manager 230 generates messages to network clients 240 in response to events or conditions associated with data or objects that are stored in memory slots 210.
  • Network 250 comprises any combination or number of hubs, routers, bridges, gateways, switches, or any other association of suitable communication devices and related software that transmits data between network nodes 240.
  • network 250 comprises a network implemented independently or in connection with a wide area network (WAN) or a local area network (LAN) , such as an Ethernet network, a token ring network, or a fiber distributed data interface (FDDI) network.
  • WAN wide area network
  • LAN local area network
  • FDDI fiber distributed data interface
  • Network 250 supports higher level connectionless protocols such as Internet Protocol (IP), higher level connection-oriented protocols such as Frame Relay, or any other suitable networking protocol.
  • IP Internet Protocol
  • Network 250 may be used in a multi- enterprise collaboration to implement workflows including activities that take place among or between more than one enterprise.
  • Each network node 240 of network 250 in a multi-enterprise collaboration may be associated with a different enterprise, allowing communication and coordinated performance of activities and workflows between enterprises.
  • Network nodes 240 may be any terminal, server, client, hub, spoke or other device connected to network 250. Each network node 240 is associated with a particular enterprise. Network nodes 240 may or may not participate in a particular workflow or process. Network nodes 240 may access workspace 200 as part of a workflow or collaboration or as part of other activities or processes not associated with a workflow or collaboration.
  • Each memory slot 210 stores data and objects. As used herein, each means each of at least a subset of the identified items. Objects can be Java objects, C++ objects, Corba objects, or other structures that are capable of storing both information and behavior. Memory slots 210 may be any memory structure, whether queued or randomly accessed, capable of holding data or objects. Memory slots 210 may include, for example, any data structure, hashtable or memory array. Memory slots 210 may, for example, contain a plurality of objects enqued within memory slots 210 or may contain only a single object. Memory slots 210 may be stored to a disk or other storage medium or may be maintained in memory during any processes or activities conducted by computer system 205.
  • Memory slots 210 maintained in memory may be stored on random access memory, for example, enhancing the speed at which their contents are accessed over those memory slots 210 stored to a disk or peripheral component. Memory slots 210 stored to a disk or other storage media are accessible at a lower speed then memory slots 210 stored in memory but are nonvolatile allowing for the storage of persistent data or objects. Memory slots 210 can be arranged in an organizational hierarchy defined by a programmer, user or other suitable mechanism. Such a hierarchy allows easy categorization of and reference to memory slots 210 as described below in reference to FIGURE 20.
  • Permissibility framework manager 220 maintains and controls access to memory slots 210.
  • Permissibility framework manager 220 may include any combination of hardware and software capable of maintaining access rights to memory slots 210 and controlling access to memory slots 210 based on the access rights maintained.
  • access rights include the right of a node to: read from the contents of each of memory slots 210, write to the contents of each of memory slots 210, remove any of the contents to each of memory slots 210, and subscribe to and unsubscribe from event notification for one or more specified memory slots 210.
  • Event manager 230 generates messages to nodes 240 in response to a particular event within memory slots 210.
  • Event manager 230 may include any combination of hardware and software capable of generating messages and initiating the routing of such messages to a particular network node 240 or other suitable element of the computer system 205.
  • Network nodes 240 that have access rights to subscribe to event notification for a particular memory slot 210, as determined by permissibility framework 220, and that exercise such subscription to the particular memory slot 210, are notified by a message generated by event manager 230 each time an event requiring notification occurs that is related to the particular memory slot 210.
  • one of network nodes 240 may have access rights to subscribe to notification for a particular memory slot 210, as verified by permissibility framework manager 220, and may subscribe to notification for the particular memory slot 210 each time that the particular memory slot 210 is written to by one of network nodes 240. Until the one network node 240 unsubscribes from notification for that particular slot, each time that the particular memory slot 210 is written to by one of network nodes 240, event manager 230 will generate a message and inititiate the routing of such message to the one network node 240 indicating that the particular memory slot 210 has been written to.
  • access rights to subscribing and unsubscribing to event notification for a particular memory slot 210 may vary based on the classification of an event. For example, a particular network node 240 may have subscription rights to be notified whenever a particular memory slot 210 has data removed but not when the same memory slot 210 is written to, or the network node 240 may have subscription rights to both, or subscription may encompass notification in response to either data being removed or written in such memory slot 240. Access rights granted by permissibility framework 220 and subscription to messages from event manager 230 may also grouped in any suitable combination. For example, event notification may be subscribed to for an individual memory slot 210, all of memory slots 210, or a subset of memory slots 210 selected based upon indicated criteria. Likewise, access rights can be granted by permissibility framework 220 to all of memory slots 210 or any subset thereof.
  • FIGURE 20 illustrates one embodiment of the workspace illustrated in FIGURE 19.
  • Workspace 300 is a workspace for storing data and objects in memory slots 310 that are arranged in a hierarchical framework. The exact nature of the hierarchy and the placement of particular memory slots within the framework is definable by a workspace administrator, other user, or other suitable mechanism.
  • workspace 300 is organized into sections 305 that are further separated into individual memory slots 310 and groups 320. Groups 320 may in turn contain memory slots 310 and/or be separated into further subgroups.
  • memory slots 310 are designated by section number, group number if applicable, and then designated by s and an identification number within the applicable section 305 or group 320.
  • the memory slot 310 identified by the nomenclature "section 2.groupl.s2" denotes a slot named "s2" in group 1 of section 2 of the workspace.
  • Other hierarchy or organizational scheme may be substituted for the hierarchy described herein.
  • a hierarchy such as the one described allows easy categorization and grouping of memory slots 310.
  • Such categorization can be used to easily group memory slots 310 for purposes of maintaining access rights.
  • a network node 240 from FIGURE 20 may only be granted a particular access right to a specific tier of memory slots 310.
  • Such a tier may be all memory slots 310 at the group level, for example, or memory slots 310 designated by sectionl.sl and section section2.sl in FIGURE 20.
  • Access rights may also be granted to a particular section 305, group 320, subgroup, or combination thereof.
  • FIGURE 21 is a block diagram of a computer system 405 that uses at least one agent 460 initiated at one of a plurality of network nodes 440 to access an object workspace 400 across a network 450.
  • Network nodes 440 are connected via network 450 to workspace 400.
  • agent 460 is initiated at one of network nodes 440 to travel across network 450, access workspace 400, and perform operations or tasks in workspace 400 based on programmed commands.
  • Workspace 400 includes memory slots 410 and is embodied with any or all of the characteristics of workspaces 200 and 300 as described in reference to FIGURES 19 and 20.
  • Network nodes 440 are associated with a particular enterprise and are embodied as described in reference to network nodes 240 of FIGURE 19.
  • Network 450 is a network connecting network nodes that are involved in a particular collaboration and is embodied as described in reference to network 250 of FIGURE 19.
  • Agent 460 can be any object-oriented agent or other item that possesses the characteristic of autonomy.
  • Autonomy as defined herein, is the ability to be programed with one or more goals and to attempt to satisfy those goals independently of the originating program or application, even when moved into a network and onto other platforms such that contact is lost with the originating program.
  • Agents 460 are programmed with the goal of fulfilling collaboration activities.
  • Collaboration activities may be activities involved in the performance of a workflow or activities performed outside of a workflow that an enterprise or facility within a collaboration may initiate to perform administration, optimization or execution tasks related to data or objects that are in workspace 400.
  • Collaboration activities may also be queries intended to collect data or manipulate data or objects that are in workspace 400.
  • An administrative agent 460 for example, may be initiated to modify characteristics of the memory slot hierarchy as described in reference to FIGURE 20.
  • An administrative agent 460 may also be initiated to change the subscription profile of an originating network node 440, thereby altering the type of event notification received by that network node 440.
  • a specific agent 460 may even originate from a specific network node 440 that has the authority to alter the permissibility framework, and thereby enable agent 460 to modify access rights of one or more network nodes 440 to specified memory slots 410.
  • An optimization agent 460 may be initiated to modify characteristics or behavior of an object stored in workspace 400 to improve that object's performance during workflow determination or execution.
  • An execution agent 460 may perform a series of tasks or calculations using objects in workspace 400 and return a result of such tasks or calculations to its initiating network node 440.
  • a query agent 460 may perform complex queries on workspace 400 and return a result of such queries to its initiating network node 440. Agents 460 can operate inside workspace 400 as well, returning results to another agent 460 or network node 440.
  • Workspace 400 may, like workspaces 200 and 300, have a permissibility framework and/or event manager capable of interacting with or responding to agent 460.
  • agent 460 may need to interact with a permissibility framework, as described in FIGURE 19, in order to verify that the originating network node 440 of agent 460 has access rights to a particular memory slot 410 that contains objects or data with which agent 460 wishes to interact.
  • a event manager may respond to an operation performed by agent 460 within a particular memory slot 460 by sending an event notification message to subscribing network nodes 440 as described in reference to FIGURE 19.
  • FIGURE 22 is a flowchart illustrating one embodiment of a method of using the agent of FIGURE 21 to access a workspace.
  • a node of the network initiates an agent programmed to execute at least one task in a remote workspace.
  • the agent is sent across the network to a workspace that is coupled to a second node of the network.
  • the workspace has a plurality of memory slots, each operable to store at least one object, a permissibility framework, and a event manager.
  • the agent indicates to the permissibility framework a specific memory slot that the agent wishes to access.
  • the permissibility framework verifies that the node of the network that initiated the agent has access rights to the indicated memory slot.
  • step 550 the agent performs one or more operations as described in reference to FIGURE 21.
  • step 560 the agent returns the results of the operations, if any, to the initiating node.
  • step 570 a event manager sends an event to a node of the network that has subscribed to event notification that corresponds to an operation the agent has performed and to the memory slot accessed by the agent.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)
  • Multi Processors (AREA)
EP99927184A 1998-06-05 1999-06-03 System amd method for implementing object workspace agents in a decision support environment Withdrawn EP1084475A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US92348 1998-06-05
US09/092,348 US6119149A (en) 1998-06-05 1998-06-05 System and process allowing collaboration within and between enterprises for optimal decision making
US156265 1998-09-18
US09/156,265 US6334146B1 (en) 1998-06-05 1998-09-18 System and method for remotely accessing data
PCT/US1999/012347 WO1999063466A1 (en) 1998-06-05 1999-06-03 System amd method for implementing object workspace agents in a decision support environment

Publications (1)

Publication Number Publication Date
EP1084475A1 true EP1084475A1 (en) 2001-03-21

Family

ID=26785565

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99927184A Withdrawn EP1084475A1 (en) 1998-06-05 1999-06-03 System amd method for implementing object workspace agents in a decision support environment

Country Status (8)

Country Link
US (1) US6334146B1 (ja)
EP (1) EP1084475A1 (ja)
JP (1) JP2002517828A (ja)
KR (1) KR20010052573A (ja)
AU (1) AU4415299A (ja)
CA (1) CA2333748A1 (ja)
TW (1) TW425517B (ja)
WO (1) WO1999063466A1 (ja)

Families Citing this family (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6529937B1 (en) * 1999-01-29 2003-03-04 International Business Machines Corporation System and method for communicating client IP addresses to server applications
US6564246B1 (en) * 1999-02-02 2003-05-13 International Business Machines Corporation Shared and independent views of shared workspace for real-time collaboration
US7979382B2 (en) 1999-05-04 2011-07-12 Accenture Global Services Limited Component based information linking during claim processing
US8095413B1 (en) 1999-05-07 2012-01-10 VirtualAgility, Inc. Processing management information
DE19930660A1 (de) * 1999-07-02 2001-01-11 Siemens Ag Verfahren zur Überwachung oder zur Installation neuer Programmcodes in einer industriellen Anlage
US7743089B2 (en) 1999-10-13 2010-06-22 Intel Corporation Method and system for dynamic application layer gateways
US7249315B2 (en) 1999-11-23 2007-07-24 John Brent Moetteli System and method of creating and following URL tours
US6810429B1 (en) * 2000-02-03 2004-10-26 Mitsubishi Electric Research Laboratories, Inc. Enterprise integration system
US20010047387A1 (en) * 2000-03-27 2001-11-29 Exoplex, Inc. Systems and methods for providing distributed cross-enterprise portals
US6832263B2 (en) * 2000-04-27 2004-12-14 Hyperion Solutions Corporation Method and apparatus for implementing a dynamically updated portal page in an enterprise-wide computer system
US6986046B1 (en) * 2000-05-12 2006-01-10 Groove Networks, Incorporated Method and apparatus for managing secure collaborative transactions
JP2001331468A (ja) * 2000-05-19 2001-11-30 Nec Corp 複数のコンピュータ間の連携業務フロー管理システム
US20020059120A1 (en) * 2000-06-06 2002-05-16 Milton James K. Method and apparatus for creating and maintaining a virtual inventory in a distributed network
US7899690B1 (en) 2000-08-18 2011-03-01 The Crawford Group, Inc. Extended web enabled business to business computer system for rental vehicle services
US8600783B2 (en) 2000-08-18 2013-12-03 The Crawford Group, Inc. Business to business computer system for communicating and processing rental car reservations using web services
AU2001292567A1 (en) * 2000-09-01 2002-03-13 Togethersoft Corporation Methods and systems for improving a workflow based on data mined from plans created from the workflow
US7024497B1 (en) * 2000-09-07 2006-04-04 Adaptec, Inc. Methods for accessing remotely located devices
US20020035483A1 (en) * 2000-09-20 2002-03-21 Patel Kirtikumar Natubhai Multiple portal distributed business/information system and method
US6453361B1 (en) * 2000-10-27 2002-09-17 Ipac Acquisition Subsidiary I, Llc Meta-application architecture for integrating photo-service websites
JP2002149754A (ja) * 2000-11-07 2002-05-24 Toshiba Microelectronics Corp 作業管理システム及び作業管理方法
IES20010064A2 (en) * 2001-01-29 2002-04-17 Eland Technologies Inc Computer network system
EP1386214A4 (en) * 2001-04-05 2007-07-04 Envirospectives Inc PROCEDURES FOR PLANNING, TRANSMITTING AND EVALUATING PROJECTS THAT EFFECT THE ENVIRONMENT
US7685105B2 (en) * 2001-04-05 2010-03-23 Envirospectives, Inc. System and method for indexing, organizing, storing and retrieving environmental information
JP3772102B2 (ja) * 2001-07-30 2006-05-10 株式会社東芝 情報処理方法、情報処理装置及びプログラム
US20030046338A1 (en) * 2001-09-04 2003-03-06 Runkis Walter H. System and method for using programable autonomous network objects to store and deliver content to globally distributed groups of transient users
US20030097410A1 (en) * 2001-10-04 2003-05-22 Atkins R. Travis Methodology for enabling multi-party collaboration across a data network
US20030131071A1 (en) * 2002-01-08 2003-07-10 G.E. Information Services, Inc. Electronic document interchange document object model
US8176334B2 (en) * 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US20110099163A1 (en) * 2002-04-05 2011-04-28 Envirospectives Corporation System and method for indexing, organizing, storing and retrieving environmental information
US20030225926A1 (en) * 2002-05-30 2003-12-04 Sensemaking Technologies Corp. Collaboration envelopes: a method to improve collaborative sensemaking
US7676541B2 (en) * 2002-05-30 2010-03-09 Microsoft Corporation Peer communication channel partitioning
US7043522B2 (en) * 2002-05-30 2006-05-09 Microsoft Corporation Unbounded computing space
US7634806B2 (en) * 2002-05-30 2009-12-15 Microsoft Corporation Peer assembly inspection
US7478233B2 (en) * 2002-05-30 2009-01-13 Microsoft Corporation Prevention of software tampering
US8108231B2 (en) 2002-06-14 2012-01-31 The Crawford Group, Inc. Method and apparatus for improved customer direct on-line reservation of rental vehicles
US20040039612A1 (en) 2002-06-14 2004-02-26 Neil Fitzgerald Method and apparatus for customer direct on-line reservation of rental vehicles
US20040006399A1 (en) * 2002-06-26 2004-01-08 Klein Alan L. Method and system for managing and monitoring an organization
US7627504B2 (en) * 2002-10-31 2009-12-01 Thomson Reuters (Tax and Accounting) Services, Inc. Information processing system for determining tax information
US8195714B2 (en) 2002-12-11 2012-06-05 Leaper Technologies, Inc. Context instantiated application protocol
US7925246B2 (en) 2002-12-11 2011-04-12 Leader Technologies, Inc. Radio/telephony interoperability system
US20040181580A1 (en) * 2003-03-11 2004-09-16 Etienne Baranshamaje Method, computer useable medium, and system for portable email messaging
WO2004102454A2 (en) * 2003-05-07 2004-11-25 Sap Aktiengesellschaft An end user oriented workflow approach including structured processing of ad hoc workflows with a collaborative process engine
US8126742B2 (en) 2003-05-09 2012-02-28 Accenture Global Services Limited Automated assignment of insurable events
US7356697B2 (en) * 2003-06-20 2008-04-08 International Business Machines Corporation System and method for authentication to an application
CN1577261B (zh) * 2003-06-30 2010-04-28 中兴通讯股份有限公司 一种对单片机封装的系统
US20050203757A1 (en) * 2004-03-11 2005-09-15 Hui Lei System and method for pervasive enablement of business processes
US8387037B2 (en) * 2005-01-28 2013-02-26 Ca, Inc. Updating software images associated with a distributed computing system
US7571154B2 (en) * 2005-01-31 2009-08-04 Cassatt Corporation Autonomic control of a distributed computing system using an application matrix to control application deployment
US7680799B2 (en) * 2005-01-31 2010-03-16 Computer Associates Think, Inc. Autonomic control of a distributed computing system in accordance with a hierarchical model
US7685148B2 (en) * 2005-01-31 2010-03-23 Computer Associates Think, Inc. Automatically configuring a distributed computing system according to a hierarchical model
US7590653B2 (en) * 2005-03-02 2009-09-15 Cassatt Corporation Automated discovery and inventory of nodes within an autonomic distributed computing system
US7917914B2 (en) * 2005-06-09 2011-03-29 Whirlpool Corporation Event notification system for an appliance
US7921429B2 (en) * 2005-06-09 2011-04-05 Whirlpool Corporation Data acquisition method with event notification for an appliance
US20070162158A1 (en) * 2005-06-09 2007-07-12 Whirlpool Corporation Software architecture system and method for operating an appliance utilizing configurable notification messages
US20070050229A1 (en) * 2005-08-17 2007-03-01 Edward Tatro Methods and systems for providing access to decision critical information for food services supply chain management
US7933786B2 (en) 2005-11-01 2011-04-26 Accenture Global Services Limited Collaborative intelligent task processor for insurance claims
US7505993B2 (en) * 2005-12-14 2009-03-17 International Business Machines Corporation Database schema for content managed data
US8271309B2 (en) 2006-03-16 2012-09-18 The Crawford Group, Inc. Method and system for providing and administering online rental vehicle reservation booking services
EP2070026A4 (en) 2006-10-06 2012-01-18 Crawford Group Inc METHOD AND SYSTEM FOR TRANSMITTING VEHICLE REPAIR INFORMATION TO A B2B COMPUTER SYSTEM FOR MANAGING RENTAL CAR RESERVATIONS
US8082301B2 (en) * 2006-11-10 2011-12-20 Virtual Agility, Inc. System for supporting collaborative activity
US8160906B2 (en) 2006-12-12 2012-04-17 The Crawford Group, Inc. System and method for improved rental vehicle reservation management
WO2009015288A1 (en) 2007-07-25 2009-01-29 The Crawford Group, Inc. System and method for allocating replacement vehicle rental costs using a virtual bank of repair facility credits
US8020177B2 (en) * 2007-07-27 2011-09-13 Composite Ideas, Llc Contained command invocation middleware framework
US8515786B2 (en) 2008-02-22 2013-08-20 Accenture Global Services Gmbh Rule generation system adapted for an insurance claim processing system
US8478769B2 (en) 2008-02-22 2013-07-02 Accenture Global Services Limited Conversational question generation system adapted for an insurance claim processing system
US20100023352A1 (en) * 2008-07-23 2010-01-28 The Crawford Group, Inc. System and Method for Improved Information Sharing by Repair Facilities for Managing Rental Vehicle Reservations
US7953896B2 (en) * 2009-05-27 2011-05-31 Microsoft Corporation Managing user accounts and groups in multiple forests
US9785894B2 (en) * 2010-03-31 2017-10-10 Oracle International Corporation Simulation of supply chain plans using web service
US9740994B2 (en) 2010-03-31 2017-08-22 Oracle International Corporation Simulation of supply chain plans using data model
US20130205013A1 (en) * 2010-04-30 2013-08-08 Telefonaktiebolaget L M Ericsson (Publ) Network management in a communications network
US8707277B2 (en) * 2011-05-02 2014-04-22 Raytheon Company Systems, methods, and language for SCA CORBA descriptor files
US9594512B1 (en) * 2015-06-19 2017-03-14 Pure Storage, Inc. Attributing consumed storage capacity among entities storing data in a storage array
US12012110B1 (en) 2023-10-20 2024-06-18 Crawford Group, Inc. Systems and methods for intelligently transforming data to generate improved output data using a probabilistic multi-application network

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5023773A (en) 1988-02-10 1991-06-11 International Business Machines Corporation Authorization for selective program access to data in multiple address spaces
US5321605A (en) 1990-06-01 1994-06-14 Motorola, Inc. Process flow information management system
US5630069A (en) * 1993-01-15 1997-05-13 Action Technologies, Inc. Method and apparatus for creating workflow maps of business processes
US5822585A (en) * 1995-02-21 1998-10-13 Compuware Corporation System and method for cooperative processing using object-oriented framework
US5781732A (en) * 1996-06-20 1998-07-14 Object Technology Licensing Corp. Framework for constructing shared documents that can be collaboratively accessed by multiple users
US5974395A (en) 1996-08-21 1999-10-26 I2 Technologies, Inc. System and method for extended enterprise planning across a supply chain
US5819243A (en) * 1996-11-05 1998-10-06 Mitsubishi Electric Information Technology Center America, Inc. System with collaborative interface agent
US6065039A (en) * 1996-11-14 2000-05-16 Mitsubishi Electric Information Technology Center America, Inc. (Ita) Dynamic synchronous collaboration framework for mobile agents
US5941945A (en) * 1997-06-18 1999-08-24 International Business Machines Corporation Interest-based collaborative framework
US6009456A (en) * 1997-07-30 1999-12-28 Lockheed Martin Corp. Information exchange by intelligent mobile agents in a network
US5931900A (en) * 1997-08-25 1999-08-03 I2 Technologies, Inc. System and process for inter-domain interaction across an inter-domain connectivity plane
US5995945A (en) * 1997-08-25 1999-11-30 I2 Technologies, Inc. System and process for inter-domain planning analysis and optimization using model agents as partial replicas of remote domains
US5960404A (en) * 1997-08-28 1999-09-28 International Business Machines Corp. Mechanism for heterogeneous, peer-to-peer, and disconnected workflow operation
US6052724A (en) * 1997-09-02 2000-04-18 Novell Inc Method and system for managing a directory service
US6119159A (en) * 1997-09-09 2000-09-12 Ncr Corporation Distributed service subsystem protocol for distributed network management
US6065120A (en) * 1997-12-09 2000-05-16 Phone.Com, Inc. Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices
US6055574A (en) * 1998-03-10 2000-04-25 Unisys Corporation Method of providing a service through a server with a virtual single network address

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9963466A1 *

Also Published As

Publication number Publication date
TW425517B (en) 2001-03-11
CA2333748A1 (en) 1999-12-09
JP2002517828A (ja) 2002-06-18
US6334146B1 (en) 2001-12-25
WO1999063466A1 (en) 1999-12-09
AU4415299A (en) 1999-12-20
KR20010052573A (ko) 2001-06-25

Similar Documents

Publication Publication Date Title
US6334146B1 (en) System and method for remotely accessing data
US6289385B1 (en) Computer workspace providing event management based on a permissibility framework
US6289384B1 (en) System and method for event notification through a firewall
US6332155B1 (en) System and process allowing collaboration within and between enterprises for optimal decision making
US6442528B1 (en) Exemplar workflow used in the design and deployment of a workflow for multi-enterprise collaboration
US6567783B1 (en) Communication across one or more enterprise boundaries regarding the occurrence of a workflow event
US6397191B1 (en) Object-oriented workflow for multi-enterprise collaboration
US7039597B1 (en) Method and system for managing collaboration within and between enterprises
US6397192B1 (en) Synchronizing one or more workflows using one or more synchronization-join activities that include synchronization logic
MXPA00012054A (en) System amd method for implementing object workspace agents in a decision support environment
MXPA00012057A (en) Exemplar workflow used in the design and deployment of a workflow for multi-enterprise collaboration
MXPA00012051A (en) System and process for multi-enterprise collaboration
MXPA00012056A (en) Method and system for managing collaboration within and between enterprises
MXPA00011718A (es) Sincronizacion de flujo de trabajo
MXPA00012058A (en) Improved method and system for providing client callbacks through a firewall within and between enterprises
MXPA00012050A (en) Workflow communication
MXPA00011320A (en) System and method for creating an object workspace

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20001222

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): DE FR GB

RIN1 Information on inventor provided before grant (corrected)

Inventor name: WHIPPLE, MARK, B.

Inventor name: PARASNIS, ABHAY, V.

Inventor name: NOTANI, RANJIT, N.

17Q First examination report despatched

Effective date: 20061221

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20070502